Search Results

There are 12454 results for: content related to: A novel signature based on the combination of global and local signatures for image copy detection

  1. Unique bonding pattern and resulting bond stretch isomerism in Be32−

    International Journal of Quantum Chemistry

    Volume 115, Issue 7, April 5, 2015, Pages: 426–433, Tamal Goswami, Satadal Paul, Subhajit Mandal, Anirban Misra, Anakuthil Anoop and Pratim K. Chattaraj

    Article first published online : 20 JAN 2015, DOI: 10.1002/qua.24866

  2. Distance protection using a time–frequency filtering technique

    International Transactions on Electrical Energy Systems

    Volume 25, Issue 4, April 2015, Pages: 678–696, Pradipta Kishore Dash and Sarat Kumar Swain

    Article first published online : 11 JAN 2014, DOI: 10.1002/etep.1866

  3. Brittle and ductile failure of rocks: Embedded discontinuity approach for representing mode I and mode II failure mechanisms

    International Journal for Numerical Methods in Engineering

    Volume 102, Issue 8, 25 May 2015, Pages: 1507–1526, M. Nikolic, A. Ibrahimbegovic and P. Miscevic

    Article first published online : 28 JAN 2015, DOI: 10.1002/nme.4866

  4. Study of hybrid drag models for predicting hydrodynamic behaviour in a spouted bed

    The Canadian Journal of Chemical Engineering

    Volume 91, Issue 11, November 2013, Pages: 1776–1785, Dyrney A. Santos, Irineu J. Petri, Claudio R. Duarte and Marcos A. S. Barrozo

    Article first published online : 17 JUN 2013, DOI: 10.1002/cjce.21866

  5. New approach to H ∞  filtering of two-dimensional T-S fuzzy systems

    International Journal of Robust and Nonlinear Control

    Volume 23, Issue 17, 25 November 2013, Pages: 1990–2012, Lizhen Li, Weiqun Wang and Xiaofeng Li

    Article first published online : 9 JUL 2012, DOI: 10.1002/rnc.2866

  6. Close galaxy pairs at z = 3: a challenge to UV luminosity abundance matching

    Monthly Notices of the Royal Astronomical Society

    Volume 426, Issue 2, 21 October 2012, Pages: 1647–1662, Joel C. Berrier and Jeff Cooke

    Article first published online : 1 OCT 2012, DOI: 10.1111/j.1365-2966.2012.21866.x

  7. Revisiting the TP Model Transformation: Interpolation and Rule Reduction

    Asian Journal of Control

    Volume 17, Issue 2, March 2015, Pages: 392–401, Víctor Costa da Silva Campos, Leonardo Antônio Borges Tôrres and Reinaldo Martinez Palhares

    Article first published online : 30 MAR 2014, DOI: 10.1002/asjc.866

  8. Wide passband/stopband bandpass filter based on transversal signal interference concepts and modified branch-line structure

    International Journal of RF and Microwave Computer-Aided Engineering

    Volume 25, Issue 4, May 2015, Pages: 330–336, Zhi-peng Li, Tao Su and Chang-hong Liang

    Article first published online : 6 NOV 2014, DOI: 10.1002/mmce.20866

  9. A transient method for mass-transfer characterization through supported zeolite membranes: Extension to two components

    AIChE Journal

    Volume 59, Issue 3, March 2013, Pages: 959–970, Lucile Courthial, Arnaud Baudot, Mélaz Tayakout-Fayolle and Christian Jallut

    Article first published online : 3 JUL 2012, DOI: 10.1002/aic.13866

  10. On the Fourier cosine series expansion method for stochastic control problems

    Numerical Linear Algebra with Applications

    Volume 20, Issue 4, August 2013, Pages: 598–625, M.J. Ruijter, C.W. Oosterlee and R.F.T. Aalbers

    Article first published online : 14 FEB 2013, DOI: 10.1002/nla.1866

  11. Optical manipulation of charged microparticles in polar fluids


    Volume 34, Issue 22-23, December 2013, Pages: 3141–3149, Giuseppe Pesce, Vincenzo Lisbino, Giulia Rusciano and Antonio Sasso

    Article first published online : 25 OCT 2013, DOI: 10.1002/elps.201300214

  12. On prioritised opportunistic spectrum access in cognitive radio cellular networks

    Transactions on Emerging Telecommunications Technologies

    Yong Yao, Alexandru Popescu and Adrian Popescu

    Article first published online : 8 OCT 2014, DOI: 10.1002/ett.2866

  13. A multilevel correction method for Stokes eigenvalue problems and its applications

    Mathematical Methods in the Applied Sciences

    Qun Lin, Fusheng Luo and Hehu Xie

    Article first published online : 3 JUN 2013, DOI: 10.1002/mma.2866

  14. Design of a 1-GSample/s 9-b double sampling track-and-hold amplifier in BiCMOS technology

    International Journal of Circuit Theory and Applications

    Volume 42, Issue 5, May 2014, Pages: 511–528, Hung-Yi Lin and Yen-Tai Lai

    Article first published online : 17 OCT 2012, DOI: 10.1002/cta.1866

  15. Multi-resolution analysis for high accuracy and efficiency of Euler computation

    International Journal for Numerical Methods in Fluids

    Volume 74, Issue 9, 30 March 2014, Pages: 661–683, Hyungmin Kang, Kyunghyun Park, Kyuhong Kim and Dohyung Lee

    Article first published online : 6 JAN 2014, DOI: 10.1002/fld.3866

  16. A new intrusion detection method based on SVM with minimum within-class scatter

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1064–1074, Wenjuan An and Mangui Liang

    Article first published online : 18 DEC 2012, DOI: 10.1002/sec.666

  17. Data privacy breach prevention framework for the cloud service

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 982–1005, Chandramohan Dhasarathan, Vengattaraman Thirumal and Dhavachelvan Ponnurangam

    Article first published online : 15 JUN 2014, DOI: 10.1002/sec.1054

  18. A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1860–1871, Lu Leng, Andrew Beng Jin Teoh, Ming Li and Muhammad Khurram Khan

    Article first published online : 12 NOV 2013, DOI: 10.1002/sec.900

  19. Matrix embedding in multicast steganography: analysis in privacy, security and immediacy

    Security and Communication Networks

    Weiwei Liu, Guangjie Liu and Yuewei Dai

    Article first published online : 14 NOV 2014, DOI: 10.1002/sec.1168

  20. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720